learn more about encryption

Encryption-Related Articles

Encryption software is a very important part of security infrastructure, but it is not the only part. Both Kryptel and Silver Key provide a very high level of data protection, but if you wrote your password on a post-it and stuck it to your monitor, the security level would be zero no matter how strong encryption was. No encryption software can guarantee that your data is safe – it is just a tool that requires some understanding and skill.

This section contains a few articles that will help you to get most from your Kryptel or Silver Key software and ensure safety of your data.

General Articles

How to Choose a Good Password

Choosing a quality hacking-resistant password is not as simple as it sounds, and this article may give you a few useful hints. The article contains practical recommendations, covering three most important how-tos: how to choose, how to use, and how not to lose.

Binary Keys

A short introduction into binary keys. Binary key is usually kept on a flash stick and is used instead of password – just plug it in.

Data Shredding

This article gives you some insight into data shredding – what is it and why do you need it. You will also find a few useful tips there.

Quick Intro to Encryption

Exactly what the title says: an introduction. Nothing new here for experienced users, but if you are new to encryption, this article can make the picture clearer.

Deploying Kryptel and Silver Key

Describes special installation methods, useful mainly in multi-user environment.

Default and Forced Settings

This article describes special techiques for system administrators who need to configure the software for mass deployment or server-side processing.

Kryptel-related Articles

Getting Started with Kryptel

Quick introduction to basic Kryptel functions for new Kryptel users.

Encrypted Backup

How-to on creating and scheduling encrypted backup.

Kryptel Data Recovery

How-to for recovering data from a corrupted container using Kryptel Data Recovery.

Integration with Total Commander

Describes installing and using Kryptel (Kryptelite) plug-in for Total Commander. The plug-in component allows accessing Kryptel containers and Kryptel encrypted backups directly in the Total Commander panes.

Silver Key-related Articles

Silver Key Quick Start

Quick how-to for new Silver Key users.

WebSilver for Web Storage

A tool for transparent file exchange via popular Web storage services.

Silver Key Uploaders

Uploading Silver Key parcels to Web storage.

Using Certificates

Signing Silver Key parels: how to obtain and how to use digital certificates.

Compatibility with Older Versions

If you or your correspondent use an old version of Silver Key: possible issues and how to solve them.

Hardware Yubikeys

What Is Yubikey

A brief introduction. What is Yubikey and what do you get by using a hardware key.

Setting Up Your Yubikey

A guide to obtaining and setting up a new Yubikey.

Using Yubikey

Using Yubikeys for individuals and workgroups.

Managing Yubikey Lists

Creating and managing pre-created Yubikey lists.


Creating Virtual Keyboards

Describes in detail how to create a custom virtual keyboard.

Translating to Other Languages

How to localize Kryptel or Silver Key into another language.

Technical Information

The purpose of these articles is to provide information on internal data formats for public scrutiny. At least a basic understanding of programming is required.

Kryptel Storage Model

An introduction to Kryptel storage model, required for understanding other technical articles.

Kryptel 6 Advanced Storage

Structure of standard Kryptel 6 container.

Kryptel 7 Modifiable Storage

Structure of Kryptel 7 container.

Kryptel FIPS 140-2 Storage

Structure of FIPS 140-2 -compliant Kryptel container.

Kryptel Agents

Specifications of Kryptel File Agent and Kryptel Backup Agent.

Silver Key Parcel

Format of Silver Key parcel.

Silver Key FIPS 140-2 Parcel

Format of Silver Key FIPS 140-2 parcel.

Encrypted Stream

Encrypted stream is a basic encryption building block. This article describes how a block of source data is converted to an encrypted form.

Key File

Describes the format of Kryptel key file.

Yubikey Implementation Notes

Provides full details on how Kryptel and Silver Key work with hardware Yubikeys.